This is a false sense of security, there are other tools that are much more effective at doing this.
Zscaler is an example. But that's okay, it's your choice.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.